Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,248)
  • Open Access

    ARTICLE

    Hybrid Soft Computing Technique Based Trust Evaluation Protocol for Wireless Sensor Networks

    Supreet Kaur*, Vijay Kumar Joshi

    Intelligent Automation & Soft Computing, Vol.26, No.2, pp. 217-226, 2020, DOI:10.31209/2018.100000064

    Abstract Wireless sensor networks (WSNs) are susceptible to safety threats due to cumulative dependence upon transmission, computing, and control mechanisms. Therefore, securing the end-to-end communication becomes a major area of research in WSNs. A majority of existing protocols are based upon signature and recommended-based trust evaluation techniques only. However, these techniques are vulnerable to wormhole attacks that happen due to lesser synchronization between the sensor nodes. Therefore, to handle this problem, a novel hybrid crossover-based ant colony optimization-based routing protocol is proposed. An integrated modified signature and recommendationbased trust evaluation protocol for WSNs is presented. Extensive experiments reveal that the proposed… More >

  • Open Access

    ARTICLE

    Analysis and Prediction of New Media Information Dissemination of Police Microblog

    Leyao Chen, Lei Hong*, Jiayin Liu

    Journal of New Media, Vol.2, No.2, pp. 91-98, 2020, DOI:10.32604/jnm.2020.010125

    Abstract This paper aims to analyze the microblog data published by the official account in a certain province of China, and finds out the rule of Weibo that is easier to be forwarded in the new police media perspective. In this paper, a new topic-based model is proposed. Firstly, the LDA topic clustering algorithm is used to extract the topic categories with forwarding heat from the microblogs with high forwarding numbers, then the Naive Bayesian algorithm is used to topic categories. The sample data is processed to predict the type of microblog forwarding. In order to evaluate this method, a large… More >

  • Open Access

    ARTICLE

    User Behavior Path Analysis Based on Sales Data

    Wangdong Jiang, Dongling Zhang*, Yapeng Peng, Guang Sun, Ying Cao, Jing Li

    Journal of New Media, Vol.2, No.2, pp. 79-90, 2020, DOI:10.32604/jnm.2020.010088

    Abstract With the rapid development of science and technology and the increasing popularity of the Internet, the number of network users is gradually expanding, and the behavior of network users is becoming more and more complex. Users’ actual demand for resources on the network application platform is closely related to their historical behavior records. Therefore, it is very important to analyze the user behavior path conversion rate. Therefore, this paper analyses and studies user behavior path based on sales data. Through analyzing the user quality of the website as well as the user’s repurchase rate, repurchase rate and retention rate in… More >

  • Open Access

    ARTICLE

    Edge Detection Based on Generative Adversarial Networks

    Xiaoyan Chen, Jiahuan Chen*, Zhongcheng Sha

    Journal of New Media, Vol.2, No.2, pp. 61-77, 2020, DOI:10.32604/jnm.2020.010062

    Abstract Aiming at the problem that the detection effect of traditional edge detection algorithm is not good, and the problem that the existing edge detection algorithm based on convolution network cannot solve the thick edge problem from the model itself, this paper proposes a new edge detection method based on the generative adversarial network. The confrontation network consists of generator network and discriminator network, generator network is composed of U-net network and discriminator network is composed of five-layer convolution network. In this paper, we use BSDS500 training data set to train the model. Finally, several images are randomly selected from BSDS500… More >

  • Open Access

    REVIEW

    A Review of Person Re-Identification

    Tong Jiang*

    Journal of New Media, Vol.2, No.2, pp. 45-60, 2020, DOI:10.32604/jnm.2020.09823

    Abstract Recently, person Re-identification (person Re-id) has attracted more and more attention, which has become a research focus of computer vision community. Person Re-id is used to ascertain whether the target pedestrians captured by cameras in different positions at different moments are the same person or not. However, due to the influence of various complex factors, person Re-id still has a lot of holes to be filled. In this paper, we first review the research process of person Re-id, and then, two kinds of mainstream methods for person Re-id are introduced respectively, according to the different types of training data they… More >

  • Open Access

    ARTICLE

    Threshold-Based Adaptive Gaussian Mixture Model Integration (TA-GMMI) Algorithm for Mapping Snow Cover in Mountainous Terrain

    Yonghong Zhang1,2, Guangyi Ma1,2,*, Wei Tian3, Jiangeng Wang4, Shiwei Chen1,2

    CMES-Computer Modeling in Engineering & Sciences, Vol.124, No.3, pp. 1149-1165, 2020, DOI:10.32604/cmes.2020.010932

    Abstract Snow cover is an important parameter in the fields of computer modeling, engineering technology and energy development. With the extensive growth of novel hardware and software compositions creating smart, cyber physical systems’ (CPS) efficient end-to-end workflows. In order to provide accurate snow detection results for the CPS’s terminal, this paper proposed a snow cover detection algorithm based on the unsupervised Gaussian mixture model (GMM) for the FY-4A satellite data. At present, most snow cover detection algorithms mainly utilize the characteristics of the optical spectrum, which is based on the normalized difference snow index (NDSI) with thresholds in different wavebands. These… More >

  • Open Access

    ARTICLE

    Soft Tissue Deformation Model Based on Marquardt Algorithm and Enrichment Function

    Xiaorui Zhang1,2,*, Xuefeng Yu1, Wei Sun2, Aiguo Song3

    CMES-Computer Modeling in Engineering & Sciences, Vol.124, No.3, pp. 1131-1147, 2020, DOI:10.32604/cmes.2020.09735

    Abstract In order to solve the problem of high computing cost and low simulation accuracy caused by discontinuity of incision in traditional meshless model, this paper proposes a soft tissue deformation model based on the Marquardt algorithm and enrichment function. The model is based on the element-free Galerkin method, in which Kelvin viscoelastic model and adjustment function are integrated. Marquardt algorithm is applied to fit the relation between force and displacement caused by surface deformation, and the enrichment function is applied to deal with the discontinuity in the meshless method. To verify the validity of the model, the Sensable Phantom Omni… More >

  • Open Access

    ARTICLE

    A Reinforcement Learning System for Fault Detection and Diagnosis in Mechatronic Systems

    Wanxin Zhang1,*, Jihong Zhu2

    CMES-Computer Modeling in Engineering & Sciences, Vol.124, No.3, pp. 1119-1130, 2020, DOI:10.32604/cmes.2020.010986

    Abstract With the increasing demand for the automation of operations and processes in mechatronic systems, fault detection and diagnosis has become a major topic to guarantee the process performance. There exist numerous studies on the topic of applying artificial intelligence methods for fault detection and diagnosis. However, much of the focus has been given on the detection of faults. In terms of the diagnosis of faults, on one hand, assumptions are required, which restricts the diagnosis range. On the other hand, different faults with similar symptoms cannot be distinguished, especially when the model is not trained by plenty of data. In… More >

  • Open Access

    ARTICLE

    Design and Manufacture of Bionic Porous Titanium Alloy Spinal Implant Based on Selective Laser Melting (SLM)

    Xiaojun Chen1, Di Wang1,*, Wenhao Dou1, Yimeng Wang1, Yongqiang Yang1, Jianhua Wang2, Jie Chen1

    CMES-Computer Modeling in Engineering & Sciences, Vol.124, No.3, pp. 1099-1117, 2020, DOI:10.32604/cmes.2020.09619

    Abstract In order to meet the clinical requirements of spine surgery, this paper proposed the exploratory research of computer-aided design and selective laser melting (SLM) fabrication of a bionic porous titanium spine implant. The structural design of the spinal implant is based on CT scanning data to ensure correct matching, and the mechanical properties of the implant are verified by simulation analysis and laser selective melting experiment. The surface roughness of the spinal implant manufactured by SLM without post-processing is Ra 15 μm, and the implant is precisely jointed with the photosensitive resin model of the upper and lower spine. The… More >

  • Open Access

    ARTICLE

    Thermodynamics of Molten Pool Predicted by Computational Fluid Dynamics in Selective Laser Melting of Ti6Al4V: Surface Morphology Evolution and Densification Behavior

    Donghua Dai1,2, Dongdong Gu1,2,*, Qing Ge1,2, Chenglong Ma1,2, Xinyu Shi1,2, Han Zhang1,2

    CMES-Computer Modeling in Engineering & Sciences, Vol.124, No.3, pp. 1085-1098, 2020, DOI:10.32604/cmes.2020.010927

    Abstract The three-dimensional physical model of the randomly packed powder material irradiated by the laser beam was established, taking into account the transformation of the material phase, the melt spreading and the interaction of the free surface of the molten pool and the recoiling pressure caused by the material evaporation during the selective laser melting. Influence of the processing parameters on the thermal behavior, the material evaporation, the surface morphology and the densification behavior in the connection region of the molten pool and the substrate was studied. It was shown that the powder material underwent the transformation from the partial melting… More >

Displaying 14181-14190 on page 1419 of 22248. Per Page